From patchwork Mon Apr 12 13:04:53 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Srinath Parvathaneni X-Patchwork-Id: 1465253 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=sourceware.org; envelope-from=gcc-patches-bounces@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.a=rsa-sha256 header.s=default header.b=Er+6Ljhw; dkim-atps=neutral Received: from sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FJpvJ1zlmz9sCD for ; Mon, 12 Apr 2021 23:08:11 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E3088382E82E; Mon, 12 Apr 2021 13:08:07 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E3088382E82E DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1618232887; bh=175RMq7t0Kg19vPrbHGfbVnICjkODX3RU98Z3FIwwEc=; h=Date:To:Subject:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:Cc:From; b=Er+6LjhwBwh6CxWTayyXGyym9C2BoXAtLOV+hHNKn6vRtkxEssaz6MsRpZ+Z5fskk FdLvpALfd3R3aJts5E1FeVf/o9MjVSdqF7dNJNhSQHfXQ0qYiFwjyk69fCQ2ns/OMc 6WO6lBMy5q5zwb25QzbXyhNGg09+/f3KAwERd9o0= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20074.outbound.protection.outlook.com [40.107.2.74]) by sourceware.org (Postfix) with ESMTPS id EC58E3844008 for ; Mon, 12 Apr 2021 13:08:04 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org EC58E3844008 Received: from DU2PR04CA0046.eurprd04.prod.outlook.com (2603:10a6:10:234::21) by DB9PR08MB7082.eurprd08.prod.outlook.com (2603:10a6:10:2c2::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.21; Mon, 12 Apr 2021 13:08:02 +0000 Received: from DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:234:cafe::86) by DU2PR04CA0046.outlook.office365.com (2603:10a6:10:234::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.17 via Frontend Transport; Mon, 12 Apr 2021 13:08:02 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; gcc.gnu.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;gcc.gnu.org; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT034.mail.protection.outlook.com (10.152.20.87) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.17 via Frontend Transport; Mon, 12 Apr 2021 13:08:02 +0000 Received: ("Tessian outbound b610e7b4d771:v90"); Mon, 12 Apr 2021 13:08:02 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: e469c7081143d9e8 X-CR-MTA-TID: 64aa7808 Received: from 8f942a522023.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id EA407E5C-E9F1-49A5-BEA1-AA4C43584245.1; Mon, 12 Apr 2021 13:07:55 +0000 Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8f942a522023.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 12 Apr 2021 13:07:55 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cZWnBA5kRKULZ+5pK1JMZqRD+MmbDxtN9ryVGErU5ckwzFeGMOojM/uR9hU3K67eJa1xuz3lDtVIWwr3beiDpgCkUcPKRmvN/e5UkDEVp6nc4qWOLHxAi4vXx2e/uDAtILdihC0Nqwx6aTKBmnbsNLAQfACYk4ggE6mHuDLe0ij3uMmAMb3DEvV+NOMOt/s67LZyq/GjwRTGYUer9QglK0SlC8YuhiKCwLWLrk/1fI9nhr6K4MNdyPvFHPEBP3FxPwMoYcMtdneMiG11A18q/DXIWAXjzOOx7qLvxAxxoJ4u4qzsN3PrAkb/LczgH0QVrHkYWIFpRd/EeSYwK92Cew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=175RMq7t0Kg19vPrbHGfbVnICjkODX3RU98Z3FIwwEc=; b=D6iZUDKfQ8GylASdO1w7EDzC1x0EUTBqWT622sjrjqAJQuxeLjS91gThKXOaKZEKom7bxEiEDrTimZT1+WYU30lZTSy0ejOMi/9cIPBIbY4RBOet9XZufObDVQuqhs26lgUUlsyjGIdXIZIU+o0qb/7XYkBwo8M5H8vKm3PHHhG9QAXfwx1s8a8Q85zMo6ihZMZ9gLm4L4rfvBmZtcmLPOuJwRrGWGeolZVzuRbASfGq00q+B3yDablLTBUz/y6CsoEn3JJqVlHg5oYPmR75YhSE3PXL/uU4M+Nl8Gs2ZffvKh4nSG3ipM2eDbXlC5kf8EJk8kkaN/Mi0LBOFf7N7g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none Authentication-Results-Original: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; Received: from VI1PR0802MB2368.eurprd08.prod.outlook.com (2603:10a6:800:9d::10) by VI1PR08MB2765.eurprd08.prod.outlook.com (2603:10a6:802:18::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.17; Mon, 12 Apr 2021 13:07:54 +0000 Received: from VI1PR0802MB2368.eurprd08.prod.outlook.com ([fe80::f1fd:229a:89be:eca]) by VI1PR0802MB2368.eurprd08.prod.outlook.com ([fe80::f1fd:229a:89be:eca%7]) with mapi id 15.20.4020.022; Mon, 12 Apr 2021 13:07:53 +0000 Date: Mon, 12 Apr 2021 14:04:53 +0100 To: gcc-patches@gcc.gnu.org Subject: [GCC][Patch] arm: Fix the mve multilib for the broken cmse support (pr99939). X-Originating-IP: [217.140.106.54] X-ClientProxiedBy: LO4P123CA0125.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:192::22) To VI1PR0802MB2368.eurprd08.prod.outlook.com (2603:10a6:800:9d::10) Message-ID: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from e120703-lin.cambridge.arm.com (217.140.106.54) by LO4P123CA0125.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:192::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.22 via Frontend Transport; Mon, 12 Apr 2021 13:07:52 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c2dcbb42-f569-4086-d155-08d8fdb40100 X-MS-TrafficTypeDiagnostic: VI1PR08MB2765:|DB9PR08MB7082: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8273;OLM:8273; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR0802MB2368.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(396003)(346002)(366004)(376002)(39860400002)(16526019)(235185007)(44832011)(8676002)(186003)(26005)(66476007)(8936002)(33656002)(478600001)(66946007)(6486002)(956004)(86362001)(52536014)(4326008)(9686003)(2906002)(66616009)(6512007)(316002)(6916009)(52116002)(66556008)(5660300002)(33964004)(38100700002)(38350700002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2765 Original-Authentication-Results: gcc.gnu.org; dkim=none (message not signed) header.d=none;gcc.gnu.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: b3f47aae-8fd6-4615-297c-08d8fdb3fb2e X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(136003)(396003)(39860400002)(376002)(346002)(36840700001)(46966006)(81166007)(8936002)(82740400003)(6486002)(9686003)(8676002)(356005)(36860700001)(6512007)(82310400003)(70586007)(6916009)(4326008)(235185007)(44832011)(52536014)(70206006)(478600001)(86362001)(33656002)(66616009)(47076005)(956004)(2906002)(16526019)(26005)(316002)(186003)(336012)(5660300002)(33964004); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Apr 2021 13:08:02.5626 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c2dcbb42-f569-4086-d155-08d8fdb40100 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB7082 X-Spam-Status: No, score=-15.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, GIT_PATCH_0, KAM_LOTSOFHASH, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Srinath Parvathaneni via Gcc-patches From: Srinath Parvathaneni Reply-To: Srinath Parvathaneni Cc: Richard.Earnshaw@arm.com Errors-To: gcc-patches-bounces@gcc.gnu.org Sender: "Gcc-patches" Hi, The current CMSE support in the multilib build for "-march=armv8.1-m.main+mve -mfloat-abi=hard -mfpu=auto" is broken as specified in PR99939 and this patch fixes the issue. Regression tested on arm-none-eabi and found no regressions. Ok for master? and Ok for GCC-10 branch? Regards, Srinath. gcc/testsuite/ChangeLog: 2021-04-12 Srinath Parvathaneni PR target/99939 * gcc.target/arm/cmse/cmse-20.c: New test. libgcc/ChangeLog: 2021-04-12 Srinath Parvathaneni PR target/99939 * config/arm/t-arm: Make changes to use cmse.c for all the armv8.1-m.main mulitlibs. ############### Attachment also inlined for ease of reply ############### diff --git a/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c b/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c new file mode 100644 index 0000000000000000000000000000000000000000..7e2739e14792624adf5b4280ca58a5d8320acbf0 --- /dev/null +++ b/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c @@ -0,0 +1,28 @@ +/* { dg-do run } */ +/* { dg-additional-options "-mcmse -Wl,--section-start,.gnu.sgstubs=0x00190000" } */ + +#include +#include +#include + +void __attribute__((cmse_nonsecure_entry)) +secure_fun (int a, int *p) +{ + void *b = cmse_check_address_range ((void *)p, a, 1); + + if (b == NULL) + __builtin_abort (); + printf("%d", *((int *)b)); +} + +int +main (void) +{ + int *ptr; + int size = 1; + ptr = (int *) calloc (1, sizeof(int *)); + *ptr = 1315852292; + secure_fun (size, ptr); + free (ptr); + return 0; +} diff --git a/libgcc/config/arm/t-arm b/libgcc/config/arm/t-arm index 3625a2590beec4e4e0e0881be9ad284c595c7190..949e2ee06653680211ff2dcf0b55a41a6aedc31c 100644 --- a/libgcc/config/arm/t-arm +++ b/libgcc/config/arm/t-arm @@ -9,11 +9,12 @@ CMSE_OPTS:=-mcmse endif ifdef HAVE_CMSE -ifndef HAVE_V81M -libgcc-objects += cmse.o cmse_nonsecure_call.o +libgcc-objects += cmse.o cmse.o: $(srcdir)/config/arm/cmse.c $(gcc_compile) -c $(CMSE_OPTS) $< +ifndef HAVE_V81M +libgcc-objects += cmse_nonsecure_call.o cmse_nonsecure_call.o: $(srcdir)/config/arm/cmse_nonsecure_call.S $(gcc_compile) -c $< endif diff --git a/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c b/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c new file mode 100644 index 0000000000000000000000000000000000000000..7e2739e14792624adf5b4280ca58a5d8320acbf0 --- /dev/null +++ b/gcc/testsuite/gcc.target/arm/cmse/cmse-20.c @@ -0,0 +1,28 @@ +/* { dg-do run } */ +/* { dg-additional-options "-mcmse -Wl,--section-start,.gnu.sgstubs=0x00190000" } */ + +#include +#include +#include + +void __attribute__((cmse_nonsecure_entry)) +secure_fun (int a, int *p) +{ + void *b = cmse_check_address_range ((void *)p, a, 1); + + if (b == NULL) + __builtin_abort (); + printf("%d", *((int *)b)); +} + +int +main (void) +{ + int *ptr; + int size = 1; + ptr = (int *) calloc (1, sizeof(int *)); + *ptr = 1315852292; + secure_fun (size, ptr); + free (ptr); + return 0; +} diff --git a/libgcc/config/arm/t-arm b/libgcc/config/arm/t-arm index 3625a2590beec4e4e0e0881be9ad284c595c7190..949e2ee06653680211ff2dcf0b55a41a6aedc31c 100644 --- a/libgcc/config/arm/t-arm +++ b/libgcc/config/arm/t-arm @@ -9,11 +9,12 @@ CMSE_OPTS:=-mcmse endif ifdef HAVE_CMSE -ifndef HAVE_V81M -libgcc-objects += cmse.o cmse_nonsecure_call.o +libgcc-objects += cmse.o cmse.o: $(srcdir)/config/arm/cmse.c $(gcc_compile) -c $(CMSE_OPTS) $< +ifndef HAVE_V81M +libgcc-objects += cmse_nonsecure_call.o cmse_nonsecure_call.o: $(srcdir)/config/arm/cmse_nonsecure_call.S $(gcc_compile) -c $< endif